RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1...

12
RAPID AND SECURE LARGE-SCALE MIGRATIONS

Transcript of RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1...

Page 1: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

RAPID AND SECURE LARGE-SCALE MIGRATIONS

Page 2: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

2

TABLE OF CONTENTS

1.0 Cloud Migration Strategies 3

1.1 Large-Scale, Rapid, and Secure Cloud Migration 6

1.2 Discovery, Validation, Assessment, and Planning 7

1.3 Automated Rapid Migration 7

1.4 Cloud Migration with DevSecOps 9

1.5 Cloud-Enabled Networking 9

1.6 Security Approval Acceleration and Secure Legacy Workloads 10

1.6.1 Templated Security Control Automation and Secure Configuration

Compliance Automation 10

1.6.2 Secure Legacy Workloads with Unisys Stealth® 10

1.7 Unisys Cloud Management Solution 11

1.8 Migration Factory Project Approach 12

2.0 Summary 12

LIST OF EXHIBITS

Exhibit 1.0-1. Cloud Migration Planning Options 3

Exhibit 1.0-2. Unisys Cloud Migration Factory 4

Exhibit 1.0-3. Unisys Cloud Migration Planning and Lifecycle Management Approach 5

Exhibit 1.1-1. Common Cloud Migration Challenges 6

Exhibit 1.1-2. Unisys’ Industrialized Large Scale Rapid Cloud Migration Approach Is Fully Automated End to End, Cost Effective, Reliably Secure, and Supports All Cloud and Hypervisor Platforms 6

Exhibit 1.3-1. Unisys Automated Cloud Migration Solution Process Flow 8

Exhibit 1.6-1. Unisys CloudForte Hybrid Cloud Management Solution 11

Exhibit 1.7-1. Unisys Migration Factory Project Organization Approach Enables Rapid and Secure Large-scale Workload Migrations 12

Page 3: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

3

1.0 Cloud Migration StrategiesCloud adoption is a key business initiative across nearly all

commercial and government organizations as they seek to enable

and accelerate innovation, deliver services more cost-effectively,

and respond more quickly to changing conditions.

Most organizations are fully committed to integrating cloud into

their IT infrastructure. According to IDG’s 2018 Cloud Computing

Survey, 73% of those polled already have at least one application

or part of their infrastructure operating in the cloud, and cloud

computing accounts for 30% of IT budgets on average. Improving

the speed of IT service delivery was the top business driver behind

that investment.

But leveraging emerging technologies can be risky and challenging.

Many organizations have thousands of legacy applications that

need to be migrated in some fashion. Cost control and speed of

implementation are crucial factors, requiring large-scale automation

and assured security, along with an imperative to keep operations

up and running during the transition.

These bulk migrations require the right partners, skills, and

the right solution to move swiftly. With years of assessment,

consulting and transformation experience at global enterprises

and governments, large and small, Unisys has unique insights into

how organizations must select the appropriate path and operating

model to move workloads and accelerate the move to the cloud as

they seek to innovate, reduce risk, and create high-performance

outcomes. Unisys builds, manages, and secures cloud and

infrastructure solutions for some of the most complex and digitally

demanding enterprises and governments in the world.

Migrations that introduce enterprise standards provide

organizations with greater scalability, improved analytics, better

utilization of IT resources and managed services, mobile and

remote access, and more efficient and cost-effective disaster

recovery. Retail and financial organizations can implement

processes across multiple channels (storefront, digital, mobile,

social) to increase revenue, improve the customer experience,

and gain efficiencies; government agencies can provide citizen

services and solutions at lower costs and with greater efficiency.

Both government and commercial organizations can more quickly

develop new services and products, and more easily retrofit or

retire those that don’t meet expectations.

There is no single, golden template for cloud implementation

and migration. New applications can be developed in a cloud

environment using modern cloud technology and a DevSecOps

methodology. For existing applications and workloads hosted in

data centers, organizations have a number of options to consider

in migrating to public clouds (e.g., Amazon Web Services [AWS],

Azure, Google, Oracle, IBM, etc.) or private clouds (OpenStack,

VMware, CloudStack, Nutanix, etc.). Exhibit 1.0-1 lists typical

options for a cloud migration strategy.

Deciding the migration plan for each application system, prioritizing

actions, developing the proper migration sequence, and meeting

associated security and performance requirements are critical

elements for cloud migration projects. Mission requirements,

business priorities, operational challenges, budget constraints,

regulatory mandates, and other issues drive the decision on

migration strategy for each application.

Unisys: A Cloud Service Leader• Ranked by International Data Corporation (IDC) as one

of the Top 4 leading system integrators serving Federal

Government

• Rated as a Leader in Cloud Infrastructure Migration

and Management by NelsonHall and Forester in 2016

and 2017

• Rated as a Leader in the NelsonHall Vendor Evaluation

and Assessment Tool (NEAT) Cloud Advisory

Assessment and Migration Evaluation 2018

• Rated by Gartner as one of the three top providers

having the most comprehensive strengths in Hybrid IT

Infrastructure Management and Cloud Migrations

• Awarded Most Innovative Company in 2017 by

Washington Technology magazine’s Industry

Innovators

• More than 900 AWS, Azure, or Google certifications

Options Description Examples

Rehost

“Lift and Shift” move

without any application

platform or coding

change. The compute

and storage capacity

may be optimized during

the move. Configurations

of workloads may

be adjusted to the

destination environment.

Migrate Windows or

Linux Operating Systems

hosted on virtual servers

or x86 physical servers.

Migrate to virtual

private cloud on-prem

configuration mirrored to

third-party cloud provider

environment for cloud

native capabilities.

Replatform

For legacy applications,

“replatform” migrates

the applications

to Windows/Linux

Operating Systems

or uses emulators or

compatibility tools to run

the applications in cloud.

Migrate mainframe

applications to cloud

using emulators; use

AppZero for moving

applications from

Windows 2003 on to a

newer OS in cloud;

re-platform Unix

applications to Linux OS

and then to cloud.

Refactor

Replace some

components of an

application with PaaS/

cloud services.

Replace an on-prem

relational database with

a cloud native relational

database management

system service.

RecodeRe-write existing

applications in cloud.

Rewrite applications with

cloud native services.

Repurchase

Replace the current

application with SaaS

solutions.

Migrate email services to

Microsoft Office 365.

Exhibit 1.0-1. Cloud Migration Planning Options.

Page 4: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

4

While there is no single template for all to-cloud migrations, the

successful large-scale migration of enterprise workloads has a

few core building blocks. As shown in Exhibit 1.0-2, these building

blocks include:

• Use of a repeatable “migration factory” methodology that

includes introduction of enterprise shared-service standards

• Agile-based planning/re-planning migration management

• Continuous Integration/Continuous Delivery (CI/CD),

for DevOps/DevSecOps enabled customers

• A migration management portal to track overall progress

• An end-to-end Cloud-Migration-Lifecycle that ensures optimal

performance is maintained at the enterprise, and application

levels

• Cost inefficiency. Costs associated with facilities, labor

resources, hosting operation, assets, and hard-to-automate

or-integrate operations in managing existing data centers are

unavoidable.

• Risk with instability. Often what drives cloud migration is an

unstable facility, inadequate capacity, or the lack of skilled

resources in the current data centers.

• Inability to execute. Business are unable to execute against

challenging environment depending on the business cycle they

are currently in.

• Unachievable speed. Organizations need to deliver services

faster than ever before. It is an impossible task, however, when

computing capacity cannot be provisioned on demand in a

flexible, reliable, and elastic fashion with cost transparency.

Rapid and secure migration to cloud can lead to immediate cost

savings by reducing facilities management, physical assets, and

data center operations. The savings achieved from the data center

consolidation/reduction/elimination, efficiency in application hosting

services, and capital expense (CapEx) to operating expense (OpEx)

transition can then be allocated to application modernization. This

reallocation of cost savings resolves the budget challenges facing

most information technology (IT) organizations in IT modernization

and digital transformation. The faster and more reliably that cloud

migration can be performed, the higher the return on investment.

At Unisys, we view cloud adoption as a journey that requires

Agile-based continual assessment and optimization for improving

performance, service effectiveness, and cost efficiency. As further

detailed in Exhibit 1.0-3, we apply a structured approach with

sprint-focused cloud migration planning/replanning and cloud

services lifecycle management.

Our discovery, assessment, and cloud planning include detailed

considerations on business factors, people and organization,

governance, applications and data assessment (including cloud

suitability, interfaces, and affinity to other client applications),

technical infrastructure/platform, security, and operations

management. Engagement (and communication) with the

application owner’s organization is methodically planned and

executed via the Unisys Organization Change Management (OCM)

methodology.

Agile-based, Sprint-focused plan/re-plan Real-time Tracking via Drill-down Portal

Continuous Integration/Continuous Delivery (CD/CI) Continual Enterprise Performance Optimization

Rapid RepeatableAutomatedMigrations

Post-MigrationApplication

Optimization

Discover Assess Plan MigrateOperate and

Optimize

Discovery and OCM Structured

Engagement

Cloud Landing Zone Setup

Exhibit 1.0-2. Unisys Cloud Migration Factory.

For a large organization with thousands of applications in its

service portfolio, recoding all applications for cloud migration will

likely be very time consuming and costly. In the meantime, the

organization still needs to continue to operate its data center,

manage infrastructure assets, and deal with all the capital

expenditure required for refresh and capacity expansion. These

preceding challenges are more than simple annoyances. Every day

that passes while locked in the data center translates into:

Page 5: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

5

Business: Mission

Benefits, Finance,

Business Case, ROI

People: Skills,

Knowledge, Organization,

Communication

Platform: Cloud Service

Provider, Architecture,

Technology, XaaS

Governance: Policy and

Process, EA, R&R, SDLC,

SLAs, CCB

Security: Risk,

Compliance,

Accreditation,

Architecture, Ops

Operations: ITIL ITSM

Policy, Processes, and

Procedures

• Applications Infrastructure Technology Assets

• Cost

• Operations

• Stakeholders

• Dependencies

• Constraints

• Capacity and Demands

• Business and Service Models

• App Grouping

• Architecture

• Cloud Readiness

• Migration strategy

- Rehost

- Replatform

- Refactor

- Recode

• Project Plan and WBS

• Resource and RACI

• Training

• Risk Management

• Procurement Plan

• Migration Approach

• Landing Zone Plan

• Network Connectivity

• Security Plan

• Configuration and Change Control

• Test and QA Plan

• Migration Waves

• Landing Zone

- Accounts and IdAM

- Network

- Security

- Operations Support

• Pilot

• Test and Validation

• User Acceptance

• Communicate

• Execute Cutover

• Security Accreditation

• Metering and Expense

• ITSM Processes

• Security Operations

• Monitor and Reporting

• User Support

• Configuration Compliance

• Change and Release

• Automate

• DevSecOps

• Cloud Native Solutions

Unisys Differentiators

• Unisys Cloud Organizational

Change Management

• Automated Application Portfolio

Discovery and Analysis

• Unisys Cloud Security Solution

Package

• Unisys Automated Workload

Migration Acceleration-Safe and

Secure Large-scale Migration in Days,

rather than Months

• Unisys Cloud Solutions for VDI, App

Virtualization, O365, Backup and DR,

HPC...

• Unisys Next-Gen

Hybrid Cloud/

IT Management

Solution

• App

Modernization

with Cloud

Native SolutionsUnisys Cloud Migration Manager (CMM)-Automated end to end Cloud Migration

Management

Unisys Cloud Forte™ for AWS and Azure-Cloud Native, Secure,

Automated, Accelerated

Exhibit 1.0-3. Unisys Cloud Migration Planning and Lifecycle Management Approach.

Discover Assess Plan MigrateOperate and

Optimize

Migrating workloads and applications to cloud is just the first step

of the cloud journey. To realize all the benefits of cloud, effective

governance in security, workload lifecycle management, and

expense optimization must be implemented. In addition, it is

imperative to leverage native services, such as Software-as-a-service

(SaaS), and Platform-as-a-Service (PaaS) available in the cloud

platforms, to continually transform applications. Cloud agnostic and

native cloud services provide cost-effective, innovative, flexible, and

readily available building blocks for enabling bimodal IT and allowing

an organization to deliver services with agility and efficiency.

Unisys provides strong expertise and service experience in

modernizing mission applications with cloud native services,

and PaaS and SaaS services. Unisys worked with one large

U.S. government agency to deliver many mission applications

with AWS native services, including traveler identification using

AWS Recognition and Lambda, and advanced data warehousing

and analytics using AWS Redshift and Kinesis. For a global

mining company, Unisys designed and implemented a digital

transformation roadmap and migration to the public cloud of

the IT infrastructure that serves more than 5,000 employees

across operations spanning three continents, while producing

cost savings of more than 30% by moving servers to the cloud.

A major educational institution relied on Unisys for Hybrid Cloud

services, including deployment of a private and public cloud, data

virtualization, and backup and disaster recovery services.

Page 6: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

6

1.1 Large-Scale, Rapid, and Secure Cloud MigrationThere are plenty of challenges in performing cloud migrations, particularly for a complex environment with thousands of workloads and for one supporting many organizations and customers. Planned or executed improperly, the migration can be a complex and difficult operation, leading to significant efforts, cost, and risk. Exhibit 1.1-1 highlights common challenges in migrating workloads to clouds.

Challenge Description

Lack of complete understanding of the workloads in the source environment

• Incomplete inventory of all application systems• Incomplete configuration knowledge of all

workloads• Incomplete understanding of interdependencies

among workloads and applications• Incomplete understanding of the interaction

and interfaces with external systems• Lack of understanding/confidence on

application cloud readiness

Different virtualization technologies between source and destination environments

While most organizations’ IT workloads are hosted on VMware or Microsoft Hyper-V platforms, private clouds and public commercial clouds are often built with different virtualization technologies. Migrating virtual machines to a different hypervisor platform often requires ineffective manual translation and conversion.

Performance impact on production applications

Obtaining backup for systems and data in the source environment could be intrusive and resource consuming. The operation tends to degrade production performance.

Time-consuming data transfer

Transferring large data and system images through WAN network can be very time and resource consuming. There is also data pilferage security risk.

Tedious and error-prone network configuration changes

Configuring network and security settings in the destination environment and preserving the original designs implemented in the source environment can be an error-prone task for large-scale migrations.

Discover, Validate, Assess, and Plan Automated Rapid Migration Accelerate ATO and Protect Legacy Workload

1) Discover and Validate:Assets, Network, Security, Topology, Dependency, Application Profiling2) Assessment:App Rationalization, Business Classification, Cloud Readiness3) Planning:• App/System Grouping• Go/To-Go/No-Go

1) Landing Zone Setup2) Configuration Capture3) Backup4) Transfer/Replication5) Restore and Replatform6) Test7) Cut Over

Light-Weight Plug and Play Toolkit Checklists Repeatable Methodology

Automated Landing Zone Setup End-to-End Migration Automated to Any Clouds DevSecOps Process Rugged Migration-in-a-Box Service Catalog with Tiered Fixed Unit Prices

Unisys Stealth® Secures Legacy Systems and Distributed Systems via Microsegmentation

Automated Configuration Compliance Scan and Automated Configuration Remediation

Templated Security Control for ATO Acceleration

1) Automated Configuration Remediation for Compliance

2) Configuration Security Assessment3) Flexible Microsegmentation for Clouds

Exhibit 1.1-2. Unisys’ Large-Scale Cloud Migration Approach Is Fully Automated End to End, Cost-Effective, Reliably Secure, and Supports

All Cloud and Hypervisor Platforms.

Time-consuming security operating approvals

Moving applications to a multitenancy hosting environment in public or private clouds often requires security accreditation for highly regulated industries or government agencies. The Federal Authority to Operate (ATO) process, and the commercial security approvals process, can be very time consuming and costly.

Security risks with legacy systems

Legacy applications or outdated OS workloads pose security risks. In the source data center, the risks may be contained in a physically isolated security enclave. When they are migrated to a multitenancy cloud environment, a new security approval is required.

Exhibit 1.1-1. Common Cloud Migration Challenges.

From delivering hundreds of global cloud migration projects, Unisys

has developed best practices with a set of mature processes and

proven automation solutions. We can apply our processes and

automation to all kinds of workloads and all cloud platforms for

accelerating the “rehost,” “replatform,” and “refactoring” migration

of an overabundance of workloads to cloud. Our CloudForte™

solution provides for large-scale, rapid, and secure migration

that is easily manageable, highly automated, resource efficient,

and without compromise or downtime to customers’ business

operations. It simplifies and automates workload migrations,

provides highly automated configuration remediation for security

compliance, offers flexible and effective compensating security

control, while saving substantial time and delivering cost savings.

As illustrated in Exhibit 1.1-2, Unisys cloud migration provides

effective processes and technologies to address the three major

cloud migration phases: (1) discovery, validation, assessment, and

planning; (2) migration; and (3) acceleration of security approvals

and security protection of legacy workloads and applications that

do not comply with security configuration standards.

Page 7: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

7

Unisys provides a Cloud Migration Service Catalog Manual with

tiered, fixed unit prices from which our customers can order cloud

migration services. In the manual, we offer fixed prices for different

tiers of discovery and a migration planning service based on the

size of a source data center. We offer fixed per-server migration

pricing for three tiers, based on the data size and server system

complexity. We offer cost transparency, service flexibility, and low

project risk for our customers.

1.2 Discovery, Validation, Assessment, and PlanningIt is critical to have a complete understanding of the inventory

and interdependencies of the workloads and applications before

migration. The maturity level of IT service management varies

among organizations. Some IT shops have rigorous control

and accurate knowledge of asset inventory, system/network/

application/security configurations, application dependencies,

interfaces, capacity, and performance. Other IT shops have less

complete or inaccurate information. It is important to validate the

inventory, configuration, and dependency information first—before

migration.

Unisys brings a highly cost-effective, high-value, lightweight

discovery solution for source data center discovery. Our CloudForte

agentless discovery solution performs the following discoveries:

• Simple Network Management Protocol (SNMP)

• Load balancer

• Hypervisors and virtual machines (VMs)

• Operating system (OS)

• Domain Name System (DNS) sync and ping sweep,

• Intelligent Platform Management Interface (IPMI) auto-discovery

• Services auto-discovery

• Automated application mapping

• Network and firewall topology

It also provides Representational State Transfer (REST) Application

Programming Interfaces (APIs) and out-of-the-box connectors for

other configuration management database (CMDB) tools that

existed in the customer environment. It automatically builds

knowledge of the network environment, systems and applications,

and interactions and dependencies among them. It helps validate

data in the source data center organization’s knowledge and

configuration database. This discovery tool is already accredited

with U.S. Army Certificate of Networthiness. In combination

with application performance management tools available in

the customer organization, such as AppDynamics, New Relic,

or Dynatrace, we can build application profiling that includes

application architecture, performance metrics, transaction patterns,

user journey, and associated business processes.

We then provide a set of checklists with triage decision trees to

assess the cloud readiness of each workload and application based

on the data acquired from the discovery activities. The readiness

assessment provides one of the following outcomes: (1) ready to

move; (2) cannot be moved without significant efforts to modify the

application; and (3) while not currently ready for rehost migration, the

workloads can be replatformed or refactored relatively easily within

a short time. We then plan the migration by developing workload

bundles and the appropriate migration sequence. Each bundle

supports a single or a set of workloads supporting applications that

do not have close dependencies on systems external to the bundle.

Unisys’ methodology for discovery, validation, assessment,

and planning is highly automated and effectively orchestrated.

Depending on the environmental complexity, our typical timeline

in completing these activities is one to three months, which is far

more efficient than other models.

1.3 Automated Rapid MigrationThe first step in executing cloud migration is to establish network

connectivity, cloud landing zone, and cloud management

operations for incoming workloads. Cloud landing zone setup

includes:

• Setting up accounts

• Virtual Private Cloud (VPC), network and security configuration

• Identity and access management roles

• Billing and invoicing, utilization and expense management

• Governance controls

• Shared services and tools (health and capacity monitoring,

security controls, backup and disaster recovery/continuity

of operations [DR/COOP], event and incident management

systems, and integration)

In the cloud management operations implementation, key processes

are deployed and teams are mapped to support cloud management.

We conduct project partnership workshops to decide tooling and

configuration preferences with customers and other stakeholders.

The Unisys CloudForte solution provides configuration templates and

automates the implementation of landing zonings in AWS and Azure.

Unisys’ migration solution fully automates the migration process.

Our solution identifies inventory and grouping of systems to be

migrated, handles scheduling and planning, controls migration jobs

and logging, tracks and reports migration status, and provides a

user portal for managing the migration. Our solution treats VMs

in the destination environment as a “new computer system,” and

it loads the operating system files and data to the new computer

system with proper device drivers and configuration changes. This

approach allows us to support migration of both physical and

virtual servers, and all hypervisors, to all cloud platforms reliably.

As illustrated in Exhibit 1.3-1, our software solution performs the

following automated processes:

1. Instantiate seed VMs in the destination cloud: The Unisys

solution automatically collects detailed specifications from

servers (physical and virtual) in source environment and then

creates the VMs in the destination cloud accordingly. This

can be done through the APIs provided by cloud orchestration

platforms, or just by simply creating “seed” VMs that will

be replaced by the source server configuration or desired

configurations during migration.

2. Back up the source workloads: It creates system state and

data-level backup of the source workloads in a consistent state.

3. Move the backup files and data to the target cloud: Our

solution moves the backup files and data with encryption and

compression to the target cloud either via network replication or

by transporting in a rugged physical appliance.

Page 8: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

8

4. Restore and configure adjustment: In the destination site, our

solution restores servers, applications, and data to the seed

VMs already provisioned and automatically applies source

configurations to overwrite the seed VMs. It also applies proper

device drivers based on the target cloud hypervisors and the

migrated source workload operating systems. It also sets up

new network configurations according to the network settings

in the destination environment. All data are loaded into the

appropriate cloud storage systems in the destination site

automatically.

5. Replicate the incremental changes: Allowing normal production

operation for the workloads in the source data center during

migration, our solution performs “incremental sync” that

captures only data changes since a prior capture. It replicates

incremental changes across network to the destination site. The

replication is compressed and encrypted. It greatly reduces the

time needed and the impact on the source site systems.

6. Apply test and evaluation: The workloads migrated to the target

cloud environment can be activated for application functionality,

performance, and security test and evaluation. This can be

performed with the customer’s existing application testing tools

and scripts.

7. Cut over: After completing the last batch of incremental backup

and restoring the servers from the backup, the cutover is

performed. The servers in the target environment are promoted

to production.

8. Perform post-cutover test and validation: Immediately after

cutover, network connectivity and application functionality and

performance, supporting services (monitoring, security, backup

and DR, etc.) are tested and validated.

Our migration software solution can be installed as a virtual

appliance in the destination cloud environment or any secure

environment with secure network access to both source data

centers and destination environment. It handles backup and

replication across the network from source data center to the

target cloud environment.

If the data and system backup size is too large for network transfer

to be completed within a reasonable time, we offer a rugged

portable system with a form factor of flight carry-on luggage.

It includes compute capacity and 60+TB storage capacity.

We pre-build discovery software, migration software, and encryption

capability in this device. This “luggage” can be dropped to a

source data center for discovering and backing up workloads to

be migrated, and then shipped to the target cloud data center.

It allows the cloud migration of large amounts of data and large

systems to be completed in a much shorter timeframe.

Exhibit 1.3-1. Unisys Automated Cloud Migration Solution Process Flow.

Features and benefits of our solution include:

• End-to-end migration management with an intuitive user portal

that facilitates migration planning and tracks and reports status.

• Automated conversion between different infrastructure

platforms:

- Handles migrations across a wide variety of virtualization platforms automatically, including VMware, Kernel-based Virtual Machine (KVM), Xen hypervisor, Hyper-V, etc.

- Performs automated physical server to virtual server conversion.

- Automates migration of VMware workloads to AWS, Azure, Google, Oracle, IBM public cloud, and private clouds built of CloudStack, OpenStack, Nutanix, Azure Stack, etc.

- Automatically accounts for the features and attributes specific to a given private cloud–build technology and performs transformation accordingly.

Source Environment

Migration

DiscoverLinux and Windows use ssh

Capture

Encrypted Xfer Data/FileSystemFrom static snapshot

Destination Cloud Environment

Non-disruptiveExact replica except

DriversOptionally networking

Server

Standard OSqueries

Runtime OSSnapshot

Static Snapshot

FileSystembookmark

Live IOsApps still running

(Flushed IOs)

App

Format DiskCreate Partitions

Populate Data

Configure Drivers

Configure Network

Boot

UnisysMigrator

CMDBMetadata

Provision VM

Inject Drivers

Page 9: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

9

• Agentless architecture that avoids the need to install and

manage agents in an environment of many servers. It eases

operations and reduces time, cost, and support efforts.

• Support for cloud migration testing and validation. Support

allows customers to stand up multiple systems in the

destination site using a backup set before the final cutover.

• Customized pre-capture, post-capture, and systems standing up

operations. Scripted operations can be added to perform special

actions before and after the image capture. Some examples

include suspending virus scanning, putting an Oracle database

in backup mode before the capture, or changing the allocation

of virtual resources during migration.

• Highly efficient, resilient, and secure data transfer. All data are

transferred in encrypted and compressed format and secured

from tampering or data pilferage. It provides error handling and

operation retry features, so intermittent network connectivity

issues do not cause data transfer failure.

• Unwind logical volume management in physical systems. In private

and public cloud environments, storage subsystems are typically

RAID configured. Our solution automatically removes the logical

volume management from physical systems contained in the

source site during systems conversion.

• Automated “guest software” management. Many virtualization

platforms require VMs to run platform-specific “guest software”

(system software and drivers) to function properly. Our solution

automatically removes the “guest software” from the source site

images and applies the proper “guest software” required for the

destination site.

• Network configuration automation. Network environment in the

destination site often differs greatly from source site. Our solution

automates the network setting reconfiguration and bulk editing to

streamline the changes.

• Right sizing of applications. Through this process, our solution

can also determine the right size of the hosting servers in

memory and processing. The added benefit is cost savings by

knowing the right infrastructure is being leveraged.

Our end-to-end migration workflow, from configuration to capture

to cutover, turns what would be a complex migration process with

unpredictable downtime into a series of simple and repeatable

steps on groups of servers. It replaces numerous manual steps

and eliminates a major source of migration errors and failures,

while incorporating local customizations and special cases

seamlessly into the process. Unisys’ workload migration solution

provides the following benefits to our clients:

• Enables rapid and secure migration for a large quantity of

workloads

• Provides near-zero disruption to production during a migration

• Automatically determines and performs the required translation

and transformation at the destination site; automatically handles

the complex and error-prone transformations required to get an

existing system running in a new infrastructure

• Supports all cloud platforms, all virtualization technologies, and

bare metal computers

• Automates customization required before and after migrations

• Manages and tracks migrations and all stages of each migration

Post-migration support provided through our cloud factory

includes helping customers get ready for operations in the cloud

environment and helping to optimize application performance

in the cloud. (e.g., how to effectively use the building blocks for

organizational standards that have been left during the migration.

1.4 Cloud Migration with DevSecOpsUnisys’ CloudForte migration solution also provides the option to perform rapid and secure cloud migration with DevSecOps methodology and toolchains. This is a solution we provide to customers who have adopted or started to adopt DevOps or DevSecOps continuous integration/continuous delivery (CI/CD). In this approach, we leverage configuration and orchestration management solutions, such as Puppet, Chef, Ansible, Terraform, etc., to capture the infrastructure system and application configurations in the source data center and then deploy the configurations and data to the target cloud environment in the form of VMs, containers, or cloud native services using DevSecOps methodology. We leverage CI/CD tooling for application performance monitoring, test automation, configuration management, code vulnerability scanning, Section 508 testing, build repositories, and open source governance tools. We port the application artifacts (source code, test suites, build automation, test data, deployment automation) to the CI/CD toolchain. We integrate landing zone templates as part of the continuous delivery automation phase and incrementally build out a set of “infrastructure as code” artifacts in a time-boxed iterative manner.

This automation ensures the application and associated content can be automatically and repeatedly (re)deployed with integrated regression, performance, and security scanning tests. We leverage CI/CD tools that support dashboard (such as SonarQube) to automate the display of the current code quality and security quality of the application. The automated display minimizes the risk of out-of-date assessment documentation. We leverage API management tools, such as Swagger self-document APIs, to ensure that documentation is up to date.

By applying the DevSecOps toolchain, we automate cloud migration and continuous delivery of cloud applications. The choice of specific tools for customer initiatives will be driven by many factors, including the consideration of tools that are already deployed and used, standards and architecture, the unique requirements for migration, etc. These decisions are made collaboratively with our

customers early in our engagement in the cloud migration initiative.

1.5 Cloud-Enabled NetworkingVirtualization of data center assets and growing reliance on cloud services are redefining the nature of enterprise-class networking. As organizations have placed more of their workloads in public cloud services and adopted private cloud environments to serve their most critical business applications, they have migrated away from hardware-based legacy networking models to software-defined networking models that accommodates their bandwidth, flexibility, and performance needs.

No move to the cloud is complete without cloud-enabled networking. This extends your network, at any data center gateway, with a secure private connection that enables a scalable and robust multi-cloud networking infrastructure that delivers virtual instances of compute, storage, and network resources catering to both their public cloud

services and business-critical private cloud applications.

Page 10: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

10

Optimizing networks and data centers for cloud environments requires updated technologies. Enterprise networks are rarely built for the amount of LAN traffic that will be pushed to the Internet when the most used applications are in the cloud. Improvements are often needed at the gateway, Internet connections, and traffic routing from satellite offices. While this concern is left unaddressed, users hit latency and connectivity issues that originate at the enterprise.

According to NetworkWorld’s 2018 State of the Network survey, 52% of surveyed organizations plan to add software-defined networking to their modernization strategy, and 15% already have SDN in place. “Software-defined networking allows the network to direct traffic without relying on the hardware to make the decision, which positions organizations for new technologies, including IoT devices, cloud-based applications, and big data apps,” NetworkWorld states.

The new data center needs to include a scalable and robust multi-cloud networking infrastructure that delivers virtual instances of compute, storage, and network resources catering to several business-critical applications. However, these technologies need to integrate and interoperate across data centers and applications that reside in various clouds. Organizations must adapt to provide a safe, robust connection to business-critical applications and data while seamlessly enabling business users to leap into a fully digitized workspace.

Many service providers offer Software Defined Networking, Network Virtualization, and Infrastructure-as-a-Service (IaaS). But only a select few service providers like Unisys combine these services from various providers and deliver them as a single entity, eliminating the various interoperability and management issues that may occur if those services are delivered individually.

When organizations consider a cloud-enabled network solution from industry recognized leaders such as Unisys, they benefit from a seamless and secure connection across the WAN to remote data centers supporting both on-site and mobile connectivity. Service providers such as Unisys help enhance your network availability and security by offering dedicated connectivity from their hosted secure data centers using Multiprotocol Label Switching (MPLS) networks, a Peer-to-Peer (P2P) Ethernet network, or cross-connects at their facilities. Unisys’ CloudForte further strengthens the IT environment by simplifying management for the entire multi-cloud infrastructure

through a single pane of glass.

1.6 Security Approval Acceleration and Secure Legacy Workloads

For U.S. Federal customers, achieving security Authority to

Operate (ATO) is required for all systems operating in a

production environment. Achieving an ATO is often a difficult and

time-consuming process. Non-Federal customers frequently have

similar time-consuming security approvals to allow operations in

their production environments.

Even for rehost migrations, while there are not application changes,

the security controls in the destination cloud environment still need

to be set up and configured properly to meet assessment and

accreditation requirements. Application updates/upgrades over

time often lead to some deviation from the secure configuration

compliance requirements and cause the security approvals for cloud

migration to become a challenging issue that can cause long delays.

In addition, for legacy workloads (i.e., old operating systems,

outdated software applications that cannot be patched) and

specialized applications that cannot be patched easily (i.e., industrial

control systems, medical control applications, enterprise resource

planning [ERP] applications, scientific research applications), security

compliance is a challenge when migrating to a multitenancy cloud

environment. There are situations where applications need to

be deployed across clouds and on-prem data centers in a highly

distributed architecture that is hard to secure.

To address these challenges, Unisys provides two distinct

solutions: 1) Templated security control automation and secure

configuration compliance automation; and 2) Unisys Stealth

security software that provides a compensating security control to

protect legacy or distributed workloads.

1.6.1 Templated Security Control Automation and Secure Configuration Compliance Automation

Unisys provides pre-configured, templated security control solutions

based on each customer’s security compliance requirements. Our

solution automatically deploys required security controls and proper

environmental configurations. It reuses and inherits the controls

already authorized in the cloud compliance packages. We use

landing zone to isolate the controls to be addressed uniquely for

each application in the migration. Unisys provides an automation

solution to scan configuration compliance and apply security

remediation for all workloads. It automates the creation and

maintenance of secure, compliant environments specific to each

application.

1.6.2 Secure Legacy Workloads with Unisys StealthUnisys Stealth is a software-defined security solution. It applies user identity and role-driven microsegmentation to secure communities of interest from attacks. It applies AES-256 encryption to protect data in motion. It leverages role and identity of users and workloads, not by Internet Protocol (IP) addresses, to build security policies. Stealth™ implements and manages a least privilege/zero-trust model based on identity. It provides a unified security platform that can extend across the enterprise—cloud, data center, and mobile. Stealth is a National Security Agency (NSA) Commercial Solutions for Classified (CSfC) certified solution. It can be deployed over any network transports (physical or virtual) and effectively prevent unauthorized east-west network movement.

Stealth does not require system or application reconfiguration and is easily integrated into existing infrastructure with minimal disruption by virtualizing network topology—dramatically reducing security management complexity and cost. It integrates with cloud infrastructure and delivers protection to critical workloads across public and private clouds. It also allows organizations to quickly gain insight into network relationships and suspicious communication. Using heuristic analysis of network data, Stealth provides visibility into network trespass attempts and traffics, and takes preventive actions to quarantine the risks. It provides intuitive traffic flow visualization that enables policy modeling to allow an organization to determine how best to permit, restrict, or block communications between sensitive data and unauthorized users. It also allows dynamic policy and controls adjustment on the fly to align with business and regulatory requirements. The benefits of the Stealth solution for a cloud environment are:

Page 11: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

11

• Preventing lateral movement of unauthorized users on the cloud

network

• Minimizing exposure through identity-defined, securely encrypted

communication

• Protecting legacy systems and workloads by reducing attack

surfaces and confining user access and application traffic within

a secured logical enclave

• Operating secure distributed applications across public and

private cloud environments

• Providing dynamic microsegmentation and quarantine threats in

seconds vs. days or months

Unisys is an NSA Trusted Integrator, and our CSfC Stealth security

solution supports any desired segmentation with highly flexible

configurations. It can be applied rapidly to the target workloads

and applications without any hardware purchase and deployment.

It provides the security assurance to application owners and cloud

hosting operators, and enables a rapid and secure cloud migration.

1.6 Unisys Cloud Management SolutionCompleting workloads migration to clouds or completing an

application refactoring/recoding in clouds is just half of the effort

required to achieve a sustainable success of cloud adoption.

A cloud management service solution must be implemented to

ensure best practices are in place in enterprise-level service

management, utilization and expense management, governance,

and security. Unisys provides multiple cloud management solutions

for managing either hybrid cloud environments or public clouds

according to customers’ needs. Our CloudForte integrated cloud

management platform solution is described in Exhibit 1.6-1.

This is a highly scalable cloud management platform solution that

provides multi-level governance, persona-based portal, automated

application provisioning across all cloud environments, cost

optimization, centralized service management and governance,

micro-services management, and direct access to native cloud

services with overarching governance.

Exhibit 1.6-1. Unisys CloudForte Hybrid Cloud Management Solution.

• Service Federation and Integration

- IT team Autonomy with Enterprise Compliance

- Centralized Management and Reporting

• Tiered Governance

- Customized, Multi-tier Policy Engine

- Ensures Compliance and Responsible Consumption

• Flexible Self and Managed Service

- Self-Service Guardrails at Policy/Tier/Role level

- Flexible managed Service Options

• Native Cloud Services

- Multiple Clouds: AWS, Azure, Google, IBM, Private Cloud

- Native Cloud Services (pre-integrated, and Gateway options)

- Quick Extensible to New Cloud/Services

• Adaptable Cost Mapping

- Ingests CSP Costs, Reports by Client Cost Centers

- Intuitive tagging/mapping to Link CSP to Client

• Container Support

- Point-in-Time Visibility to Containers (API enabled)

- Policy-based Container security

• Packaged Application Deployment

- Drag-and-Drop Build of Blueprints for Complete Systems

- End-to-end Assembly of Application System Components

Persona Based Portal/Dashboard

Data Analytics and BI

SLAReporting

Continuous ConfigurationAutomation

(Ansible, Puppet, etc.)

Billing andMetering

Built-inMonitoring

Identity and AccessManagement

3rd Party Tool Integration via API

Service Catalog

AD, SAML, LDAP, FIDM

Cloud Access GatewayAccess CSP via native

API

• Access Policy• Workload

Placement Policy

• Configuration Policy

• Lifecycle Policy• Financial Policy• Quota Policy

Infrastructure and Application Templating and Configuration Deployment

RBAC: Management, Resource User (power vs. regular), Contract, Admin, System Admin.

Enterprise Systems

ITSM: (BMC Remedy, ServiceNow): Service Desk (Incident, Service Request), Change, Problem, Asset Management, etc.

Advanced System and App Monitoring: DataDog, NewRelic, AppDynamic, ScienceLogic, etc.

Security: Cloud Access Security Broker (CASB), Scan, SIEM, SOC

Other Clouds(IP/SaaS)

ContainerManagement

Governance and Policy

Operation Automation(Backup, Patching)

Security Overlay

Cloud Brokerage,Orchestration

and Automation

Data Centers Microsoft Azure

Page 12: RAPID AND SECURE LARGE-SCALE MIGRATIONS - Unisys€¦ · 1.0 Cloud Migration Strategies 3 1.1 Large-Scale, Rapid, and Secure Cloud Migration 6 1.2 Discovery, Validation, Assessment,

1.7 Migration Factory Project ApproachIn delivering cloud migration services, Unisys applies our migration factory project approach to perform migrations across multiple

workload bundles or multiple data centers in parallel. As illustrated in Exhibit 1.7-1, our migration factory concept of operations performs

migrations in Agile sprints in a highly repeatable manner across multiple sites.

Exhibit 1.7-1. Unisys Migration Factory Project Organization Approach Enables Rapid and Secure Large-scale Workload Migrations.

2.0 SUMMARYWith years of transformation experience at global enterprises and

governments, large and small, Unisys has unique insight into how

organizations can accelerate the move to the cloud as they seek

to innovate, reduce risk, and create high-performance outcomes.

Unisys consults on, builds, manages, and secures cloud and

infrastructure solutions for some of the most complex and digitally

demanding enterprises and governments in the world.

Large-scale cloud migration can be a complex and difficult

operation if planned or executed improperly. The Unisys CloudForte

solution provides for large-scale, rapid, and secure migration that

is easily manageable, highly automated, and resource efficient.

It simplifies and automates workload migrations, provides highly

automated configuration remediation for security compliance,

and offers flexible and effective security control, while saving

substantial time and delivering cost savings.

Unisys provides proven technologies, methodologies, processes,

and expertise for large-scale cloud migration with desired speed

and security. Regardless of the type of cloud and destination,

our end-to-end fully automated cloud migration solution allows

our customers to move workloads to the cloud in a managed,

expeditious, and secure manner with near-zero down time and risk,

realizing high return on investment.

As the leader in digital transformation and an expert in cloud, we

have recognized the challenge is not in hosting in the cloud but in

the effort required to prepare applications for the migration.

In addition, our solutions address the full lifecycle needs of cloud

adoption and cloud service management. Our expertise in applying

native cloud services, PaaS, and SaaS solutions to modernize

applications and transform IT services allows our customers to

maximize the value of cloud adoption.

Printed in the United States of America 04/19 19-0179

For more information visit www.unisys.com

© 2019 Unisys Corporation. All rights reserved.

Unisys and other Unisys product and service names mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. All other trademarks referenced herein are the property of their respective owners.

To find out more, visit unisys.com/Cloudforte

Project Manager

MigrationControl

MigrationEngineering

MigrationTeam

1

MigrationTeam

2

MigrationTeam

3

Multiple Teams across multiple sites in parallel and in sprints

MigrationTeam

N

StealthSecurityTeam

Bigrocks

• Dedicated team for Bigrocks migration

• Managed as separate project

• Discovery and date gathering• Business engagement• Activity scheduling• Work orders• Tracking and monitoring• Migration team management• Risk and issue management• Performance and monitoring

• Technical SME• Technical Planning• Issue Resolution

• Dedicated team to apply Stealth microsegmentation for legacy workload protection